secure-documents.glitch.me Open in urlscan Pro
3.226.120.140  Malicious Activity! Public Scan

URL: https://secure-documents.glitch.me/pdf.html?email=
Submission: On March 12 via manual from BG — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 3.226.120.140, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is secure-documents.glitch.me.
TLS certificate: Issued by Amazon RSA 2048 M03 on December 4th 2023. Valid for: a year.
This is the only time secure-documents.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Fake Adobe Update

Domain & IP information

IP Address AS Autonomous System
2 3.226.120.140 14618 (AMAZON-AES)
1 152.199.19.160 15133 (EDGECAST)
1 146.75.116.193 54113 (FASTLY)
4 4
Apex Domain
Subdomains
Transfer
2 glitch.me
secure-documents.glitch.me
15 KB
1 imgur.com
i.imgur.com — Cisco Umbrella Rank: 7986
48 KB
1 aspnetcdn.com
ajax.aspnetcdn.com — Cisco Umbrella Rank: 2467
30 KB
4 3
Domain Requested by
2 secure-documents.glitch.me secure-documents.glitch.me
1 i.imgur.com secure-documents.glitch.me
1 ajax.aspnetcdn.com secure-documents.glitch.me
4 3

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon RSA 2048 M03
2023-12-04 -
2025-01-01
a year crt.sh
*.vo.msecnd.net
DigiCert SHA2 Secure Server CA
2024-01-30 -
2025-01-30
a year crt.sh
*.imgur.com
Sectigo RSA Domain Validation Secure Server CA
2024-02-15 -
2025-02-14
a year crt.sh

This page contains 1 frames:

Primary Page: https://secure-documents.glitch.me/pdf.html?email=
Frame ID: DC9634DF4A3801F9A532978B8ECA90FD
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Sign In - PDF CLOUD

Detected technologies

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
  • <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
  • (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

4
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

93 kB
Transfer

148 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request pdf.html
secure-documents.glitch.me/
15 KB
15 KB
Document
General
Full URL
https://secure-documents.glitch.me/pdf.html?email=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.226.120.140 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-226-120-140.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
8388f2256b1c46fe37642034a743bf72d5dcbdaedd373950035702638f0da430

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.111 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
15270
content-type
text/html; charset=utf-8
date
Tue, 12 Mar 2024 08:27:04 GMT
etag
"8b04f019cd278aeaa54b0c70560f0bfd"
last-modified
Sun, 10 Mar 2024 08:15:29 GMT
server
AmazonS3
x-amz-id-2
xgL3vIOGX+9dhIvgENQR1/bs9y/ocYWeP48SP6GtWAbMKSwxfzbYUHkqB+4rMVWu2r95axmLXOo=
x-amz-request-id
8BKCDZPYATGXJX5S
x-amz-server-side-encryption
AES256
x-amz-version-id
bv3rObOTd35pWh4RIQEpsuvWtQk1PTye
font-awesome.css
secure-documents.glitch.me/Sign-In-PDF-CLOUD_files/
0
0
Stylesheet
General
Full URL
https://secure-documents.glitch.me/Sign-In-PDF-CLOUD_files/font-awesome.css
Requested by
Host: secure-documents.glitch.me
URL: https://secure-documents.glitch.me/pdf.html?email=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.226.120.140 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-226-120-140.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://secure-documents.glitch.me/pdf.html?email=
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.111 Safari/537.36

Response headers

date
Tue, 12 Mar 2024 08:27:04 GMT
cache-control
max-age=0
content-length
3674
truncated
/
1001 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
634e6e82dbd1604a2cfd9b0303f024ef20c71eca2d655a3a2c2fd5680a5a3ed9

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.111 Safari/537.36

Response headers

Content-Type
image/png
jquery-3.3.1.min.js
ajax.aspnetcdn.com/ajax/jQuery/
85 KB
30 KB
Script
General
Full URL
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-3.3.1.min.js
Requested by
Host: secure-documents.glitch.me
URL: https://secure-documents.glitch.me/pdf.html?email=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.19.160 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/4CE1) /
Resource Hash
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://secure-documents.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.111 Safari/537.36

Response headers

date
Tue, 12 Mar 2024 08:27:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
15498816
x-cache
HIT
content-length
30394
x-xss-protection
1; mode=block
last-modified
Mon, 22 Jan 2018 19:27:49 GMT
server
ECAcc (frc/4CE1)
etag
"80288516b793d31:0"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public,max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
qLcPmYb.jpg
i.imgur.com/
48 KB
48 KB
Image
General
Full URL
https://i.imgur.com/qLcPmYb.jpg
Requested by
Host: secure-documents.glitch.me
URL: https://secure-documents.glitch.me/pdf.html?email=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
146.75.116.193 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
cat factory 1.0 /
Resource Hash
180f3bc8288f8f33b56133542536937dadecc33ceb27fcba770739061a4f5f80
Security Headers
Name Value
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://secure-documents.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.111 Safari/537.36

Response headers

date
Tue, 12 Mar 2024 08:27:04 GMT
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-amz-cf-pop
IAD89-P1
age
1139574
x-cache
Miss from cloudfront, HIT, HIT
content-length
48843
x-served-by
cache-iad-kjyo7100040-IAD, cache-fra-eddf8230118-FRA
last-modified
Sat, 29 Dec 2018 09:03:04 GMT
server
cat factory 1.0
x-timer
S1710232025.534770,VS0,VE2
etag
"47eb410e11eb45bef6391d125b3dec31"
access-control-allow-methods
GET, OPTIONS
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
x-amz-cf-id
TyfDqhcNJiZaYHT-IavqSjqbJdzu2fUzHG77pqNrj-P66qNRaQQOvA==
x-cache-hits
211, 1

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Fake Adobe Update

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://secure-documents.glitch.me/Sign-In-PDF-CLOUD_files/font-awesome.css
Message:
Failed to load resource: the server responded with a status of 404 ()